Scroll Top

Cryptocurrency-Miners dethroned Ransomware in 2018


Cryptocurrency-Miners dethroned Ransomware in 2018

Cryptocurrency-Miners Leaped Ahead of Ransomware in 2018, announced Comodo Cybersecurity Hazard Research Labs’ “International Malware Report 2018”. This report is among the very first to present 2018 information, and the company’s threat analysis reveals a really different image from 2017. Cryptocurrency-Miners rose to the top of found malware incidents, displacing ransomware – which decreased considerably in volume – as the top danger.

“Malware, like the online world itself, is simply a reflection of standard, ‘real-world’ human affairs, and malware is constantly composed for a purpose, whether it’s criminal activity, espionage, terrorism or war”, stated Dr Kenneth Geers, chief research study researcher at Comodo Cybersecurity. “Criminals’ tendencies to take money more efficiently appeared as a surge in crypto mining. And the continued strong correlation of attack volume with present geopolitical events reveals hackers of all motivations are aware of the chances significant breaking news offers them.”

During 2018, Comodo Cybersecurity found 28.9 million cryptominer incidents out of a total of 300 million malware incidents, amounting to a 10% share. The number of unique cryptominer versions grew from 93,750 in January to 127,000 in March. At the exact same time, the data reveals this criminal attention came at the expenditure of ransomware activity, with brand-new variants falling from 124,320 in January to 71,540 in March, a 42% decline.

Our only security is our ability to change. ~ John Lilly

Another unexpected finding: Altcoin Monero ended up being the leading target for Crypto-Miners’ malware, changing Bitcoin. Monero, the cryptocurrency best understood for its secrecy level, took the suspicious honour from Bitcoin of becoming the Cryptocurrency Miners’ preferred target throughout 2018. According to Cybersecurity analysts, these functions favour cybercriminals:

  • it hides deal celebrations;
  • it hides deal amounts;
  • cannot be tracked;
  • cannot be blacklisted;
  • cannot be linked to previous deals;
  • develops blocks every two minutes, providing more frequent chances for attack;
  • and was developed for mining on regular CPU power.


Hackers destabilized Coinhive: Crypto-Loot and other cryptocurrency mining services, as legitimate businesses offer website owners a method to monetize their sites by allowing customers to willingly let their computers be used for mining. The extremely brief JavaScript that enabled the opt-in service, nevertheless, was rapidly taken by cybercriminals and used for malicious functions. Widely and illegitimately spread worldwide by embedding the code into websites, Chrome extensions, typosquatted domains (URL hijacking) and malvertising, the hackers’ script stealthily uses system resources without the user’s permission to generate income by mining cryptocurrencies.


Protect your WordPress: BEFORE IT’S TOO LATE! You will also protect your customers, your reputation and your online business!

6 more important highlights from the Cybersecurity report:

Password thieves became more sophisticated and hazardous: Observed cybercriminals significantly establish and upgrade malware with the goal of stealing users’ credentials. Automated password thieves now show brand-new capabilities in both stealing information and in covering its tracks.

Expect a ransomware resurgence: Ransomware attacks led the malware market in previous years but revealed a radical decrease in the variety of total detections, likely due to the shift to the low-hanging fruit of Cryptocurrency-Miners. Ransomware’s general share of events dropped from 42% in August 2017 to simply 9% in February 2018. FAIR WARNING: get ready for brand-new ransomware attacks in a changed guise, possibly changing into a weapon of information damage – as seen with NotPetya– rather than a tool to extort ransom money.

Geopolitical malware detections associated with current events all over the world: Cybersecurity analysis yielded potential geopolitical correlations connected to national elections in China and Russia. The company found connections in Egypt, India, Iran, Israel, Turkey and Ukraine relative to military operations, along with other patterns throughout Europe, Asia and Africa.

Hot zones determined by malware: Nations that currently have the most acute difficulties related to Trojans, infections and worms consist of Brazil, Egypt, India, Indonesia, Iran, Mexico, Nigeria, Philippines, Russia and South Africa.

Hot zones by application malware: Nations in a higher socioeconomic category – that can afford more professional cyber defences – are typically pestered by a higher ratio of application malware.

Hot zones by unusual malware profiles: Finally, nations that have unusual malware profiles are Belarus, China, Israel, Japan, Kazakhstan, Turkey, United Kingdom and Ukraine.


Get Healthy, Stay Healthy: A healthier online business starts today and it begins with you!

Do you have any concerns with Cryptocurrency Miners?
Leave your thoughts in the comments below!

Related Posts